Home
last modified time | relevance | path

Searched refs:now (Results 1 – 25 of 25) sorted by relevance

/mbedtls-3.5.0/library/
Dtiming.c87 LARGE_INTEGER now, hfreq; in mbedtls_timing_get_timer() local
88 QueryPerformanceCounter(&now); in mbedtls_timing_get_timer()
90 delta = (unsigned long) ((now.QuadPart - t->start.QuadPart) * 1000ul in mbedtls_timing_get_timer()
107 struct timeval now; in mbedtls_timing_get_timer() local
108 gettimeofday(&now, NULL); in mbedtls_timing_get_timer()
109 delta = (now.tv_sec - t->start.tv_sec) * 1000ul in mbedtls_timing_get_timer()
110 + (now.tv_usec - t->start.tv_usec) / 1000; in mbedtls_timing_get_timer()
Dx509.c1004 static int x509_get_current_time(mbedtls_x509_time *now) in x509_get_current_time() argument
1016 now->year = lt->tm_year + 1900; in x509_get_current_time()
1017 now->mon = lt->tm_mon + 1; in x509_get_current_time()
1018 now->day = lt->tm_mday; in x509_get_current_time()
1019 now->hour = lt->tm_hour; in x509_get_current_time()
1020 now->min = lt->tm_min; in x509_get_current_time()
1021 now->sec = lt->tm_sec; in x509_get_current_time()
1076 mbedtls_x509_time now; in mbedtls_x509_time_is_past() local
1078 if (x509_get_current_time(&now) != 0) { in mbedtls_x509_time_is_past()
1082 return x509_check_time(&now, to); in mbedtls_x509_time_is_past()
[all …]
Dssl_client.c740 mbedtls_time_t now = mbedtls_time(NULL); in ssl_prepare_client_hello() local
741 uint64_t age = (uint64_t) (now - session_negotiate->ticket_received); in ssl_prepare_client_hello()
742 if (session_negotiate->ticket_received > now || in ssl_prepare_client_hello()
Dssl_tls13_server.c119 mbedtls_time_t now; in ssl_tls13_offered_psks_check_identity_match_ticket() local
186 now = mbedtls_time(NULL); in ssl_tls13_offered_psks_check_identity_match_ticket()
188 if (now < session->start) { in ssl_tls13_offered_psks_check_identity_match_ticket()
192 (long long) now, (long long) session->start)); in ssl_tls13_offered_psks_check_identity_match_ticket()
196 age_in_s = (uint64_t) (now - session->start); in ssl_tls13_offered_psks_check_identity_match_ticket()
Dssl_tls13_client.c931 mbedtls_time_t now = mbedtls_time(NULL); in mbedtls_ssl_tls13_write_identities_of_pre_shared_key_ext() local
934 (uint32_t) (now - session->ticket_received); in mbedtls_ssl_tls13_write_identities_of_pre_shared_key_ext()
/mbedtls-3.5.0/docs/
D3.0-migration-guide.md48 …his has moved to `include/mbedtls/build_info.h`. From C code, both headers now define the `MBEDTLS…
62 ### Most structure fields are now private
82 If you were relying on these functions, you'll now need to change to using your
88 include `mbedtls/net_sockets.h` which now should be included directly.
201 The option `MBEDTLS_ECP_FIXED_POINT_OPTIM` now increases code size and it does
223 `MBEDTLS_SHA512_NO_SHA384` was disabled by default, now `MBEDTLS_SHA384_C` is
234 The GCM module now supports arbitrary chunked input in the multipart interface.
238 * `mbedtls_gcm_starts()` now only sets the mode and the nonce (IV). Call the new function `mbedtls_…
239 * `mbedtls_gcm_update()` now takes an extra parameter to indicate the actual output length. In Mbed…
242 * `mbedtls_gcm_finish()` now takes an extra output buffer for the last partial block. This is neede…
[all …]
Duse-psa-crypto.md71 This function only worked for a small number of ciphers. It is now deprecated
/mbedtls-3.5.0/
DChangeLog8 ssl_ciphersuites.c). The preferred cipher suite is now
12 * mbedtls_x509write_crt_set_serial() is now being deprecated in favor of
15 * PSA to mbedtls error translation is now unified in psa_util.h,
46 * SHA224_C/SHA384_C are now independent from SHA384_C/SHA512_C respectively.
63 * When a PSA driver for ECDSA is present, it is now possible to disable
78 * When a PSA driver for EC J-PAKE is present, it is now possible to disable
85 * AES-NI is now supported with Visual Studio.
86 * AES-NI is now supported in 32-bit builds, or when MBEDTLS_HAVE_ASM
91 * It is now possible to use a PSA-held (opaque) password with the TLS 1.2
108 timing side-channel attacks. There is now an intrinsics-based AES-NI
[all …]
DCMakeLists.txt19 # We specify a minimum requirement of 3.10.2, but for now use 3.5.1 here
DREADME.md180 You can now make the desired change:
/mbedtls-3.5.0/tests/scripts/
Dlist-identifiers.sh64 check_names.py and is now self-complete.
/mbedtls-3.5.0/programs/test/cmake_package/
DCMakeLists.txt30 # At this point, the Mbed TLS targets should have been imported, and we can now
/mbedtls-3.5.0/programs/test/cmake_package_install/
DCMakeLists.txt33 # At this point, the Mbed TLS targets should have been imported, and we can now
/mbedtls-3.5.0/scripts/
Dwindows_msbuild.bat6 @rem These parameters are hard-coded for now.
/mbedtls-3.5.0/programs/ssl/
DCMakeLists.txt25 # propagate this information across the tree, for now it's only visible
/mbedtls-3.5.0/docs/architecture/psa-migration/
Dmd-cipher-dispatch.md246 We now need to create an abstraction for mixed-domain hash calculation. (We could not create an abs…
323 for now this is out of scope.
332 …tain either a legacy module's context (or a pointer to one, as is the case now), or a PSA context …
379 The job of this private function is to return 1 if `hash_alg` can be performed through PSA now, and…
405 #### Migration of modules that used to call MD and now do the legacy-or-PSA dance
409 #### Migration of modules that used to call a low-level hash module and now do the legacy-or-PSA da…
433 …TO_CONFIG` is disabled, this is already the case. When is enabled, we will now make it so as well.…
/mbedtls-3.5.0/tests/suites/
Dtest_suite_lmots.function211 /* Running another sign operation should fail, since the key should now have
Dtest_suite_psa_crypto_slot_management.function176 /* Test that the key is now invalid. */
323 * Test that the key handle and identifier are now not referring to an
995 * Check that we can now access the persistent key again.
Dtest_suite_hmac_drbg.function211 /* And now the normal entropy-based variant */
Dtest_suite_rsa.function492 /* And now with the copy */
560 /* And now one more time with the copy */
Dtest_suite_mps.function354 * should now succeed.
Dtest_suite_psa_crypto.function6859 /* Flip a bit in the input and verify that the signature is now
7021 /* Flip a bit in the input and verify that the signature is now
7193 /* Flip a bit in the hash and verify that the signature is now detected
8000 /* Flip a bit in the input and verify that the signature is now
/mbedtls-3.5.0/docs/architecture/
Dtls13-support.md276 likely not to be used in prototype where we now would use them in
Dmbed-crypto-storage-specification.md223 * The layout of a key file now has a lifetime field before the type field.
/mbedtls-3.5.0/scripts/data_files/driver_templates/
Dpsa_crypto_driver_wrappers.c.jinja4 * Warning: This file is now auto-generated.